Patel et al., 2004 - Google Patents
A gesture-based authentication scheme for untrusted public terminalsPatel et al., 2004
View HTML- Document ID
- 8765655724322333539
- Author
- Patel S
- Pierce J
- Abowd G
- Publication year
- Publication venue
- Proceedings of the 17th annual ACM symposium on User interface software and technology
External Links
Snippet
Powerful mobile devices with minimal I/O capabilities increase the likelihood that we will want to annex these devices to I/O resources we encounter in the local environment. This opportunistic annexing will require authentication. We present a sensor-based …
- 230000001133 acceleration 0 description 8
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers; Analogous equipment at exchanges
- H04M1/72—Substation extension arrangements; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selecting
- H04M1/725—Cordless telephones
- H04M1/72519—Portable communication terminals with improved user interface to control a main telephone operation mode or to indicate the communication status
- H04M1/72522—With means for supporting locally a plurality of applications to increase the functionality
- H04M1/72527—With means for supporting locally a plurality of applications to increase the functionality provided by interfacing with an external accessory
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers; Analogous equipment at exchanges
- H04M1/66—Substation equipment, e.g. for use by subscribers; Analogous equipment at exchanges with means for preventing unauthorised or fraudulent calling
- H04M1/667—Preventing unauthorised calls from a telephone set
- H04M1/67—Preventing unauthorised calls from a telephone set by electronic means
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W12/00—Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
- H04W12/06—Authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
- G06F21/35—User authentication involving the use of external additional devices, e.g. dongles or smart cards communicating wirelessly
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
- H04L63/0853—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using an additional device, e.g. smartcard, SIM or a different communication terminal
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W12/00—Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
- H04W12/08—Access security
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/44—Program or device authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Patel et al. | A gesture-based authentication scheme for untrusted public terminals | |
Ferrag et al. | Authentication schemes for smart mobile devices: Threat models, countermeasures, and open research issues | |
US7278024B2 (en) | Session authentication using temporary passwords | |
US8807426B1 (en) | Mobile computing device authentication using scannable images | |
Akula et al. | Image based registration and authentication system | |
Farb et al. | Safeslinger: easy-to-use and secure public-key exchange | |
Lu et al. | Dynamic key-updating: Privacy-preserving authentication for RFID systems | |
Mayrhofer et al. | Adversary models for mobile device authentication | |
JP2007174633A (en) | Computer implementation method for securely acquiring binding key for token device and secure memory device, and system for securely binding token device and secure memory device | |
BRPI0617970A2 (en) | method and arrangement for secure authentication | |
EP2182457A1 (en) | Dynamic PIN verification for insecure environment | |
He et al. | On the security of a provably secure, efficient, and flexible authentication scheme for ad hoc wireless sensor networks | |
Damopoulos et al. | Hands-free one-time and continuous authentication using glass wearable devices | |
Park et al. | Security analysis and enhancements of an improved multi-factor biometric authentication scheme | |
Cetin | Design, testing and implementation of a new authentication method using multiple devices | |
WO2023016682A1 (en) | Authentication processing services for generating high-entropy cryptographic keys | |
Chan et al. | Glass otp: Secure and convenient user authentication on google glass | |
CN106657166B (en) | A kind of method of authentication, terminal device and server | |
Li et al. | Tap-wave-rub: Lightweight malware prevention for smartphones using intuitive human gestures | |
Shrestha et al. | Tap-wave-rub: Lightweight human interaction approach to curb emerging smartphone malware | |
US7958539B2 (en) | System and method for providing secure access to password-protected resources | |
Papaioannou et al. | User authentication and authorization for next generation mobile passenger ID devices for land and sea border control | |
Papaioannou et al. | Behavioral biometrics for mobile user authentication: benefits and limitations | |
Vongsingthong et al. | A survey on smartphone authentication | |
KR20060069611A (en) | User Authentication Method in Heterogeneous Network Using Signature of Mobile Communication Terminal |